-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Dependabot cannot update to a non-vulnerable version #5927
Comments
Important note: the Yarn v2 flag is enabled for our repo @jurre Tagging you as requested 😊 |
I'll take a look at this @billinghamj. I'm actually setting up a test based on a similar issue from last week. Hopefully I can run it to ground quickly. |
I'm able to successfully recreate this by including a private package that isn't available on registry.npmjs.org or registry.yarnpkg.com. Looking at the logs it appears this is the state your repo is in as well. I'm now investigating the exact cause of the failure. |
Nice, thank you! Yeah we have several packages within our monorepo/Yarn workspace |
I've got a fix #5930 I'm getting ready to deploy. It still requires that any private registries be correctly configured or the update will fail, but previously even with correct configuration the update would fail. |
@billinghamj I've deployed the above fix now, could you give it another try and see what the result is? |
@pavera Sorry, we manually updated yesterday as it was a security alert |
In that case, I'll go ahead and close this, feel free to re-open it if another security alert comes up and we fail to provide a PR. |
Is there an existing issue for this?
Package ecosystem
npm
Package manager version
Yarn 3.2.0
Language version
No response
Manifest location and content before the Dependabot update
js/yarn.lock
dependabot.yml content
Updated dependency
@xmldom/xmldom is currently on 0.7.5
It should be updated to 0.7.6
What you expected to see, versus what you actually saw
Dependabot should have opened a PR updating @xmldom/xmldom to 0.7.6
Instead, it claims it's not able to, but there's nothing preventing this in the required resolutions
Native package manager behavior
Running
yarn up -R @xmldom/xmldom
works great, no problem:Images of the diff or a link to the PR, issue, or logs
Private, but fine for GH staff to look at it:
Smallest manifest that reproduces the issue
No response
The text was updated successfully, but these errors were encountered: